CN106982228B - A kind of realization identity authentication method and system - Google Patents

A kind of realization identity authentication method and system Download PDF

Info

Publication number
CN106982228B
CN106982228B CN201710316629.0A CN201710316629A CN106982228B CN 106982228 B CN106982228 B CN 106982228B CN 201710316629 A CN201710316629 A CN 201710316629A CN 106982228 B CN106982228 B CN 106982228B
Authority
CN
China
Prior art keywords
application server
browser
micro
terminal
service routine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710316629.0A
Other languages
Chinese (zh)
Other versions
CN106982228A (en
Inventor
孙吉平
张超群
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Senseshield Technology Co Ltd
Original Assignee
Beijing Senseshield Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Senseshield Technology Co Ltd filed Critical Beijing Senseshield Technology Co Ltd
Priority to CN201710316629.0A priority Critical patent/CN106982228B/en
Publication of CN106982228A publication Critical patent/CN106982228A/en
Application granted granted Critical
Publication of CN106982228B publication Critical patent/CN106982228B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a kind of realization identity authentication method and system, micro- end service routine independently of browser is provided, is loaded into terminal user local;When terminal user sends ID authentication request, the unique mark of the browser of acquisition is sent to application server by micro- end service routine, application server carries out the authentication of terminal user by encrypted user information by application server or micro- end service routine passes through encrypted user information authentication terminal user ID by the browser of the unique mark reflexless terminal user local of browser.By rear, application server is supplied to browser, browser to be identified by the entrance so that on end user logs to application server using encrypted user information as the entrance of browser mark.Therefore, method and system provided by the invention are when carrying out the authentication of application service, it is easy to accomplish, reduce development cost, implementation cost and maintenance cost.

Description

A kind of realization identity authentication method and system
Technical field
The present invention relates to field of computer technology, more particularly to a kind of realization identity authentication method and system.
Background technology
With the development of computer internet technology, network operator provides various applications for terminal user.In terminal When user needs to receive application service, it is often necessary to by that could be carried out using the website log provided and after being verified.It is logical Often, the process of various applications progress authentications is:The application server of network side provides the browser plug-in journey of authentication Browser plug-in is installed to terminal local by sequence when terminal user logs on to application server by browser;At end When end subscriber is logged on to by browser on application server, after obtaining subscriber identity information by browser plug-in, encryption It is sent to application server certification, after application server certification passes through, application service is provided for terminal user.
That is, entity of the application server as the authentication of terminal user, passes through browser in terminal user Encryption information is acquired when logging on to application server and carries out authentication, and acquisition modes are mainly provided using application server Browser plug-in complete.
But for the different editions of different types of browser or same type browser, applicable browser plug-in Program is different, and application server is directed to same application, and applicable different browsers plug-in unit to be arranged corresponding to different browsers Program, development cost is high, particularly, compatibility also not phase of the browser plug-in in the different editions of same type browser Together, inconsistent if the applicable browser plug-in such as the ActiveX plug-in units of IE8 and IE11 during registering use, it leads Cause implementation cost higher.Further, browser plug-in summarizes in installation process and understands because of different computer software and hardware not The problem of causing to be difficult to find the cause together, cause maintenance cost higher.
Invention content
In view of this, the embodiment of the present invention provides a kind of realization identity authentication method, this method can applied When the authentication of service, it is easy to accomplish, reduce development cost, implementation cost and maintenance cost.
The embodiment of the present invention also provides a kind of system for realizing authentication, which can be in the body for carrying out application service When part certification, it is easy to accomplish, reduce development cost, implementation cost and maintenance cost.
According to above-mentioned purpose, the invention is realized in this way:
A kind of realization identity authentication method, the micro- end service routine that will be independent of browser are loaded into user local terminal On, this method further includes:
The unique mark of the browser of acquisition is sent to by micro- end service routine when receiving ID authentication request Application server, after being matched to browser by the unique mark of browser by application server, by application server by adding Close user information authentication terminal user ID or micro- end service routine are used by encrypted user information authentication terminal Family identity.
Preferably, the unique mark for obtaining browser is:
Application server is the browser assignment unique mark, and is sent to micro- end service routine.
Preferably, the user information is when terminal user is registered to application server by browser, taken by application User information is sent to micro- end service routine by business device, and is preserved by micro- end service routine.
Preferably, described be by encrypted user information authentication terminal user ID by application server:
Encryption lock is arranged in the user local terminal;
Encrypted user information is sent to application server by micro- end service routine, is passed through by application server described Micro- end service routine accesses set encryption lock, after encrypted user information is sent to encryption lock verification, by described micro- End service routine reception is verified result.
Preferably, micro- end service routine is by encrypted user information authentication terminal user ID:
Encryption lock is arranged in the user local terminal;
After micro- end service routine receives the matching browser successful information of application server return, set by local IP access The encryption lock set verifies encrypted user information, and after success, information is proved to be successful to application server transmission.
Preferably, the certification terminal user ID further includes:
Micro- end service routine identification terminal user sends operational motion information or the user's end of ID authentication request End, by the operational motion information of ID authentication request, is sent to application server, institute is corresponded to by application server by browser It states after operational motion information determines corresponding action identification, micro- end is passed through by micro- end server or application server and is taken The encryption lock that business device accesses the setting of user local terminal carries out action verification.
Preferably, this method further includes:After application server passes through terminal user authentication, sends and add to the browser Close user information, the browser are logged on to using encrypted user information on application server, and terminal user passes through browsing Device obtains the application service that application server provides.
A kind of system for realizing authentication, including:Terminal and application server, wherein
Terminal, for loading micro- end service routine independently of browser, micro- end service routine is receiving identity When certification request, the unique mark of the browser of acquisition is sent to application server;Encrypted user information is sent to and is answered With server or pass through encrypted user information authentication terminal user ID;
Application server, for providing the terminal with micro- end service routine, by the unique mark of browser to browsing After device matching, pass through encrypted user information authentication terminal user ID.
Preferably, the user information is when terminal user is registered to application server by the browser of terminal, by User information is sent to micro- end service routine by application server, and is preserved by micro- end service routine.
Preferably, the application server, is additionally operable to after passing through to terminal user authentication, sends and add to the browser of terminal The browser of close user information, the terminal is logged on to using encrypted user information on application server, and terminal user is logical The browser for crossing terminal obtains the application service that application server provides.
As can be seen from the above scheme, the embodiment of the present invention provides micro- end service routine independently of browser, is loaded into Terminal user is local;When terminal user send ID authentication request when, micro- end service routine by the browser of acquisition only One mark is sent to application server, the browsing that application server passes through the unique mark reflexless terminal user local of browser Device carries out the authentication of terminal user by encrypted user information by application server or micro- end service routine passes through Encrypted user information authentication terminal user ID.By rear, application server is using encrypted user information as browser Entrance mark be supplied to browser, browser is identified by the entrance so that on end user logs to application server.This Sample, for the browser of different types of browser and same type of different editions, it is only necessary to be arranged using application server Micro- end service routine, without different browsers plug-in card program corresponding applicable again, therefore, side provided by the invention Method and system are when carrying out the authentication of application service, it is easy to accomplish, reduce development cost, implementation cost and maintenance cost.
Description of the drawings
Fig. 1 is a kind of realization identity authentication method flow chart provided in an embodiment of the present invention;
Fig. 2 is a kind of realization identity authentication method specific example flow chart provided in an embodiment of the present invention;
Fig. 3 is a kind of system structure diagram for realizing authentication provided in an embodiment of the present invention;
Fig. 4 is that a kind of system scenarios for realizing authentication provided in an embodiment of the present invention realize schematic diagram.
Specific implementation mode
To make the objectives, technical solutions, and advantages of the present invention more comprehensible, develop simultaneously embodiment referring to the drawings, right The present invention is described in further detail.
The embodiment of the present invention only needs for the browser for different types of browser and same type of different editions The micro- end service routine that use application server to be arranged, without corresponding applicable different browsers plug-in unit journey again Sequence provides micro- end service routine independently of browser, is loaded into terminal user local;It is asked when terminal user sends authentication When asking, the unique mark of the browser of acquisition is sent to application server by micro- end service routine, and application server passes through After the browser of the unique mark reflexless terminal user local of browser, by application server by encrypted user information into The authentication of row terminal user or micro- end service routine pass through encrypted user information authentication terminal user ID.Pass through Afterwards, application server is supplied to browser, browser to pass through this using encrypted user information as the entrance of browser mark Entrance identifies so that on end user logs to application server.
Herein, the unique mark of the browser of the acquisition is included in certification request data services journey by micro- end Sequence is sent to application server, and the certification request data can also include encrypted user information.
Therefore, the embodiment of the present invention is when carrying out the authentication of application service, it is easy to accomplish, reduce development cost, reality Apply cost and maintenance cost.
Fig. 1 is a kind of realization identity authentication method flow chart provided in an embodiment of the present invention, the specific steps are:
Step 101 is loaded into independently of micro- end service routine of the browser of terminal user on user local terminal;
In this step, user local terminal only needs once to load, and can rerun micro- end service later Program;
Step 102, micro- end service routine get the unique mark of browser;
In this step, micro- end service routine can get from application server or locally be obtained in user terminal It arrives;
In this step, when being got from application server, application server is the browser assignment unique mark, And it is sent to micro- end service routine;
Step 103, micro- end service routine are when terminal user sends ID authentication request, by unique mark of browser Knowledge is sent to application server, by application server by the unique mark of browser to browser certification;
In this step, terminal user sends what ID authentication request can make to carry out when logging in by browser;
Step 104 is taken by application server by encrypted user information authentication terminal user ID or micro- end Business program passes through encrypted user information authentication terminal user ID.
In the method, the user information in step 103 is to be registered to application server by browser in terminal user When, user information is sent to micro- end service routine by application server, and preserved by micro- end service routine.
In the method, further comprise, after application server passes through terminal user authentication, sent to the browser Encrypted user information, the browser are logged on to using encrypted user information on application server, and terminal user passes through clear Device of looking at obtains the application service that application server provides.
Fig. 2 is a kind of realization identity authentication method specific example flow chart provided in an embodiment of the present invention, specific to walk Suddenly it is:
Micro- end service routine of the browser independently of terminal user is arranged in step 201, application server;
In this step, micro- end service routine is write using the pre-buried key file of encryption lock, and and application server It is matched;
Step 202, terminal user open the website that application server provides, and web site prompts download micro- end service routine;
Micro- end service routine is downloaded to terminal local and run by step 203, terminal user;
Step 204, application server are the browser assignment unique mark for opening the website, and micro- end service routine is from answering With obtaining the unique mark in server, micro- end service routine obtains terminal user's in the form of link to grow to application server Operation and data;
In this step, the unique mark can be uuid.
Step 205, terminal user register in website, user information are uploaded to application server, application server will be used Family information passes to micro- end service routine, and micro- end service routine stores user information into the encryption lock of setting;
Step 206, terminal user are logged in by browser on website, and browser waits for application service in the form of link to grow Device transmits logon data, i.e. guid, and micro- end service routine is encrypted according to the user information in encryption lock, is calculated Guid, and be sent collectively on application server with the unique mark of the browser, carry out browser for application server Identification and terminal user identity authentication.By rear, browser gets guid and is logged in.
Figure it is seen that micro- end service routine is a program of user terminal local, it is loaded into user terminal Local is simultaneously run, the mode of operation can there are many, be always maintained at fortune for example as the form of a system service (service) Row, the unique mark of browser can be obtained, encryption lock originally can also be set on the ground in user terminal, by access or/and Set encryption lock is called, encrypted user information is authenticated.Can also between the application server of network side into The unique mark of browser and encrypted user information are sent to application server and do further matching and authentication department by row interaction Reason.Specifically, being exactly:Encrypted user information is sent to application server by micro- end service routine, by application service Device is authenticated encrypted user information.
Wherein, a kind of mode is, described to be by encrypted user information authentication terminal user ID by application server:
Encryption lock is arranged in the user local terminal;
Encrypted user information is sent to application server by micro- end service routine, is passed through by application server described Micro- end service routine accesses set encryption lock, after encrypted user information is sent to encryption lock verification, by described micro- End service routine reception is verified result.
Another way is that micro- end service routine is by encrypted user information authentication terminal user ID:
Encryption lock is arranged in the user local terminal;
After micro- end service routine receives the matching browser successful information of application server return, set by local IP access The encryption lock set verifies encrypted user information, and after success, information is proved to be successful to application server transmission.
The embodiment of the present invention realizes interaction between application server and micro- end server, disperses the method for certification, i.e.,:
Terminal user is browser assignment unique mark by application server and is deposited when being logged in or being registered by browser Storage;
Application server is accessed when terminal user logs on browser access application server or by other means When, by application server by the unique mark of browser to browser successful match, then send matching browser successful information To micro- end service routine, micro- end service routine is in the encrypted user information of local verification, to be authenticated to terminal user, at After work(, then information is proved to be successful to application server transmission.In this way, subsequent terminal user can pass through browser access application Server.
In the present invention, can also include:Application server gets terminal user authentication request data and browser mark After knowledge, it can be authenticated that terminal user whether there is or whether legal (browser that different terminals user is assigned mark is not Together, the operational motion of request in addition can be got, is such as registered, the mark of login or other certifications, different actions is different Mark.
Information of terminal user and mark can be issued the encryption lock of user local terminal setting by application server, be deposited in lock Storage has the corresponding motion action of mark and specific data, encryption lock to carry out primary certification again, then send out authentication result To application server, application server return authentication results messages are to browser.In this way, subsequent terminal user can be by clear Device of looking at accesses application server.
In the present invention, certification request can be terminal user in browser operation, be sent to application server, also may be used To be request that micro- end service routine monitors browser, micro- end service routine gives server to send request again, and the request includes The certification request of browser obtains action identification request, that is, asks application server to return to specific action identification.
Fig. 3 is a kind of system structure diagram for realizing authentication provided in an embodiment of the present invention, including:It terminal and answers With server, wherein
Terminal, micro- end service routine for loading the browser independently of terminal user, micro- end service routine exist When receiving ID authentication request, the unique mark of encrypted user information and the browser of acquisition is sent to application service Device;Encrypted user information is sent to application server or by encrypted user information authentication terminal user ID;
Application server, for providing the terminal with micro- end service routine, by the unique mark of browser to browsing After device matching, by encrypted user information authentication terminal user ID, pass through encrypted user information authentication terminal user body Part.
Within the system, the user information is to be registered to application server by the browser of terminal in terminal user When, user information is sent to micro- end service routine by application server, and preserved by micro- end service routine.
Within the system, the application server is additionally operable to after passing through to terminal user authentication, is sent out to the browser of terminal Encrypted user information, the browser of the terminal is sent to log on on application server using encrypted user information, terminal is used Family obtains the application service that application server provides by the browser of terminal.
A specific example explanation is lifted, as shown in figure 4, Fig. 4 is a kind of realization authentication provided in an embodiment of the present invention System scenarios realize schematic diagram, locally provide micro- end service routine in user terminal, asked when terminal user sends authentication When asking, the unique mark of encrypted user information and the browser of acquisition is sent to application service by micro- end service routine Device, application server will be added by the browser of the unique mark reflexless terminal user local of browser by micro- end service routine User information after close is sent to application server and carries out authentication.By rear, application server believes encrypted user It ceases and is supplied to browser as the entrance mark of browser, browser is identified by the entrance makes end user logs to application On server.
The embodiment of the present invention is can be seen that from method and system provided in an embodiment of the present invention to service by one micro- end of setting Program completes the operation of cross-terminal, and can support the browser of all types or same type different editions.More into one Step ground, micro- end service routine are far above the compatibility of browser plug-in in the compatibility of terminal, and product maintenance cost will be big It is big to reduce.
It is above to lift preferred embodiment, the object, technical solutions and advantages of the present invention are had been further described, institute It should be understood that the foregoing is merely illustrative of the preferred embodiments of the present invention, it is not intended to limit the invention, it is all the present invention's Within spirit and principle, made by all any modification, equivalent and improvement etc., should be included in protection scope of the present invention it It is interior.

Claims (6)

1. a kind of realization identity authentication method, which is characterized in that micro- end independently of browser that application server is arranged Service routine is loaded on user local terminal, and this method further includes:
The unique mark of the browser of acquisition is sent to application by micro- end service routine when receiving ID authentication request Server is passed through encrypted after being matched to browser by the unique mark of browser by application server by application server User information authentication terminal user ID or micro- end service routine pass through encrypted user information authentication terminal user body Part;
It is described to be by encrypted user information authentication terminal user ID by application server:
Encryption lock is arranged in the user local terminal;
Encrypted user information is sent to application server by micro- end service routine, passes through micro- end by application server Service routine accesses set encryption lock, after encrypted user information is sent to encryption lock verification, is taken by micro- end Business program reception is verified result;
Micro- end service routine is by encrypted user information authentication terminal user ID:
Encryption lock is arranged in the user local terminal;
After micro- end service routine receives the matching browser successful information of application server return, set by local IP access Encryption lock verifies encrypted user information, and after success, information is proved to be successful to application server transmission;
The encrypted user information is:When user information is registered to application server by terminal user by browser, by User information is sent to micro- end service routine by application server, and is stored in adding for setting by micro- end service routine In close lock, micro- end service routine is encrypted according to the user information in encryption lock, and encrypted user information is calculated.
2. the method as described in claim 1, which is characterized in that the unique mark for obtaining browser is:
Application server is the browser assignment unique mark, and is sent to micro- end service routine.
3. the method as described in claim 1, which is characterized in that the certification terminal user ID further includes:
The operational motion information of micro- end service routine identification terminal user transmission ID authentication request or user are local eventually End, by the operational motion information of ID authentication request, is sent to application server, institute is corresponded to by application server by browser It states after operational motion information determines corresponding action identification, micro- end is passed through by micro- end service routine or application server The encryption lock that service routine accesses the setting of user local terminal carries out action verification.
4. method as claimed in claim 3, which is characterized in that this method further includes:Application server is to terminal user authentication By rear, encrypted user information is sent to the browser, the browser logs on to application using encrypted user information On server, terminal user obtains the application service that application server provides by browser.
5. a kind of system for realizing authentication, which is characterized in that including:Terminal and application server, wherein
Terminal, micro- end service routine independently of browser for loading application server setting, micro- end service routine When receiving ID authentication request, the unique mark of the browser of acquisition is sent to application server;By encrypted user Information is sent to application server or micro- end service routine passes through encrypted user information authentication terminal user ID;
Application server, for providing the terminal with micro- end service routine, by the unique mark of browser to browser Match, passes through encrypted user information authentication terminal user ID when receiving encrypted user information from terminal;
The application server, be additionally operable to be specially by encrypted user information authentication terminal user ID:
Encryption lock is arranged in the terminal;
After being matched to browser by the unique mark of browser by application server, micro- end service routine is by encrypted use Family information is sent to application server, and set encryption lock is accessed by micro- end service routine by application server, will After encrypted user information is sent to encryption lock verification, result is verified by micro- end service routine reception;
Or the terminal, it is specific by encrypted user information authentication terminal user ID to be additionally operable to micro- end service routine For:
Encryption lock is arranged in the terminal;
After micro- end service routine receives the matching browser successful information of application server return, set by local IP access Encryption lock verifies encrypted user information, and after success, information is proved to be successful to application server transmission;
The encrypted user information is:When user information is registered to application server by terminal user by browser, by User information is sent to micro- end service routine by application server, and is stored in adding for setting by micro- end service routine In close lock, micro- end service routine is encrypted according to the user information in encryption lock, and encrypted user information is calculated.
6. system as claimed in claim 5, which is characterized in that the application server is additionally operable to logical to terminal user authentication Later, encrypted user information is sent to the browser of terminal, the browser of the terminal is logged in using encrypted user information Onto application server, terminal user obtains the application service that application server provides by the browser of terminal.
CN201710316629.0A 2017-05-08 2017-05-08 A kind of realization identity authentication method and system Active CN106982228B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710316629.0A CN106982228B (en) 2017-05-08 2017-05-08 A kind of realization identity authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710316629.0A CN106982228B (en) 2017-05-08 2017-05-08 A kind of realization identity authentication method and system

Publications (2)

Publication Number Publication Date
CN106982228A CN106982228A (en) 2017-07-25
CN106982228B true CN106982228B (en) 2018-10-09

Family

ID=59342742

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710316629.0A Active CN106982228B (en) 2017-05-08 2017-05-08 A kind of realization identity authentication method and system

Country Status (1)

Country Link
CN (1) CN106982228B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107563175A (en) * 2017-08-10 2018-01-09 国网冀北电力有限公司廊坊供电公司 A kind of computer information safe Initiative Defense and monitoring system
CN108234136B (en) * 2018-01-25 2019-11-12 北京深思数盾科技股份有限公司 A kind of safety access method, terminal device and system
CN109284148B (en) * 2018-09-30 2020-10-27 武汉斗鱼网络科技有限公司 Live broadcast room broadcasting reminding method and device, terminal and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102025740A (en) * 2010-12-14 2011-04-20 成都市华为赛门铁克科技有限公司 Single sign-on method, fat client, server and system
CN104065616A (en) * 2013-03-20 2014-09-24 中国移动通信集团公司 Single sign-on method and system
CN106357669A (en) * 2016-10-14 2017-01-25 武汉理工大学 Web system logging-in method and logging-in assisting system
CN106453361A (en) * 2016-10-26 2017-02-22 上海众人网络安全技术有限公司 A safety protection method and system for network information

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6335657B2 (en) * 2014-05-30 2018-05-30 キヤノン株式会社 Authority delegation system, method, authentication server system, and program

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102025740A (en) * 2010-12-14 2011-04-20 成都市华为赛门铁克科技有限公司 Single sign-on method, fat client, server and system
CN104065616A (en) * 2013-03-20 2014-09-24 中国移动通信集团公司 Single sign-on method and system
CN106357669A (en) * 2016-10-14 2017-01-25 武汉理工大学 Web system logging-in method and logging-in assisting system
CN106453361A (en) * 2016-10-26 2017-02-22 上海众人网络安全技术有限公司 A safety protection method and system for network information

Also Published As

Publication number Publication date
CN106982228A (en) 2017-07-25

Similar Documents

Publication Publication Date Title
CN108200050B (en) Single sign-on server, method and computer readable storage medium
CN111131242B (en) Authority control method, device and system
CN104378342B (en) Many accounts verification method, Apparatus and system
CN107172054B (en) Authority authentication method, device and system based on CAS
EP1177654B1 (en) Method and system for authenticating users
CN101647254B (en) Method and system for the provision of services for terminal devices
CN103198130B (en) The method and apparatus realizing the login unified with webpage at client
CN103428179B (en) A kind of log in the method for many domain names website, system and device
CN107733922A (en) Method and apparatus for calling service
CN108011862A (en) The mandate of mirror image warehouse, access, management method and server and client side
CN106982228B (en) A kind of realization identity authentication method and system
KR20010105705A (en) Method for providing integrated user management environment to multi-internet service and system for the same
CN108259431A (en) The method, apparatus and system of account information are shared between applying more
CN105162775A (en) Logging method and device of virtual machine
CN106209727B (en) Session access method and device
CN108259457B (en) WEB authentication method and device
CN103971047B (en) Certificate server and the method for authentication application
CN110365684A (en) Access control method, device and the electronic equipment of application cluster
CN107104924A (en) The verification method and device of website backdoor file
US20060224514A1 (en) Method and system for managing web profile information
CN103634111B (en) Single-point logging method and system and single sign-on client-side
CN102710621A (en) User authentication method and system
CN113141404B (en) Intelligent gateway and data sharing system
DE19939281A1 (en) Access control procedure for access to the contents of web-sites, involves using a mobile security module, such as a smart card
CN108462749A (en) A kind of Web application processing methods, apparatus and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee after: Beijing Shendun Technology Co.,Ltd.

Address before: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.